Home > Articles > Security

Security

722 Items

Sort by Date | Title

Writing Insecure C, Part 3
Oct 24, 2008
David Chisnall concludes his series on insecure C code with a discussion of strings, along with some of the more advanced problems that people encounter with C.
Safety First on craigslist
Oct 22, 2008
This chapter shows you how to protect yourself when using craigslist.
CCNA Exam 640-553 Exam Cram: Implementing Secure Management and Hardening the Router
Oct 21, 2008
This chapter outlines some methods to protect the confidentiality of remote sessions to the router.
Writing Insecure C, Part 2
Oct 17, 2008
Continuing his series on insecure C, David Chisnall points out some problems arising from handling of integers and memory in C.
Software [In]security: A Software Security Framework: Working Towards a Realistic Maturity Model
Oct 15, 2008
Gary McGraw and Brian Chess introduce a software security framework (SSF) to help understand and plan a software security initiative.
Writing Insecure C, Part 1
Oct 10, 2008
David Chisnall takes a look at some of the pitfalls involved in writing secure code in C, with a guided tour of insecure code.
The Truth About Identity Theft: Truth 27 -- ATM Scams
Oct 2, 2008
Can someone build a fake ATM to steal your card and pin? The author did. Learn how he constructed a fake ATM and how to protect yourself.
VoIP Threat Taxonomy
Sep 24, 2008
This chapter categorizes the main threats against VoIP service and explains their impact and possible methods of protection.
Software [In]security: Getting Past the Bug Parade
Sep 17, 2008
Gary McGraw explains why more attention should be paid to finding software flaws through the use of threat modeling and architectural risk analysis.
Security Analysis of a Scan-to-PC Solution
Sep 12, 2008
Seth Fogie provides a Security Analysis of "Scan-to-PC" solutions and highlights several security issues that need to be addressed before implementation.
Spam: Unwanted Email from Hell
Sep 9, 2008
Andy Walker explains what spam is, where it comes from, and what to do about it.
No Time to Patch
Sep 5, 2008
Randy Nash discusses the problems of exploits and malicious code and offers some suggestions to reduce the time to patch these vulnerabilities.
Visual Security Analysis
Aug 26, 2008
Raffael Marty shows different ways of analyzing security data using visual approaches.
Attacking and Defending the Internet with Border Gateway Protocol (BGP)
Aug 25, 2008
Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
Software [In]security: Software Security Demand Rising
Aug 11, 2008
Gary McGraw breaks down the numbers from 2007, showing that software security is making headway in the enterprise even against economic headwinds.
Perception of Security Risk: Fear, Uncertainty, and Doubt
Jul 28, 2008
Why do so many security product vendors use it as part of the sales pitch? As Randy Nash explains, because it works.
A Brief History of (Internet) Time: From the Beginnings of Malicious Code to Their Likely Future
Jul 21, 2008
Randy Nash looks at the complex relationship between computing power, the growth of the Internet, and the changes in malicious code over time.
Software [In]security: Application Assessment as a Factory
Jul 17, 2008
Gary McGraw explains how creating an application assessment factory can salvage the power of the cost per defect metric while mitigating the potential for its misuse.
The Building Blocks in a Cisco NAC Appliance Design
Jul 8, 2008
This chapter focuses on the building blocks available with the Cisco NAC Appliance solution.
Security Features on Switches
Jul 4, 2008
This chapter describes Layer 2 security basics and security features on switches available to combat network security threats.

<< < Prev Page 7 8 9 10 11 Next >